This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
cyberconquest [2021/12/07 01:52] – Charlie Root | cyberconquest [2023/08/23 04:44] (current) – Gaelin | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== CyberConquest ====== | ====== CyberConquest ====== | ||
- | Cyber Conquest is an exciting | + | Cyber Conquest is a purple-team |
- | + | ||
- | ==== Red and Blue ==== | + | |
Successful teams will consist of both attackers and defenders. Teams must communicate and work together to as effective as possible. While good offense informs defense, good defense also informs offense. | Successful teams will consist of both attackers and defenders. Teams must communicate and work together to as effective as possible. While good offense informs defense, good defense also informs offense. | ||
- | **Sign up for our December 7th competition at** [[https:// | + | ==== Defense (Blue) |
- | ---- | + | |
- | + | ||
- | ==== Objectives | + | |
Each team will be given console access to systems that they are responsible for. Similar to defensive competitions like CCDC, each of these systems will be running a set of services that must be maintained in order to gain defender points. Defenders are tasked with securing these systems while maintaining service uptime. A large part of securing these systems will consist of seeking out and destroying enemy persistence. All teams will start with nearly identical systems, so as a secondary objective, defenders should look for vulnerabilities in their systems which their attacker teammates can exploit on other teams. | Each team will be given console access to systems that they are responsible for. Similar to defensive competitions like CCDC, each of these systems will be running a set of services that must be maintained in order to gain defender points. Defenders are tasked with securing these systems while maintaining service uptime. A large part of securing these systems will consist of seeking out and destroying enemy persistence. All teams will start with nearly identical systems, so as a secondary objective, defenders should look for vulnerabilities in their systems which their attacker teammates can exploit on other teams. | ||
+ | |||
+ | ==== Attack (Red) ==== | ||
Each team will be given a token. To earn attacker points, the team must hit the scoring engine with that token (via curl, wget, etc). The goal is not to destroy systems but rather to stealthily gain access and plant persistence. Therefore, offensive and defensive points are only awarded if a system’s services are online and functioning. | Each team will be given a token. To earn attacker points, the team must hit the scoring engine with that token (via curl, wget, etc). The goal is not to destroy systems but rather to stealthily gain access and plant persistence. Therefore, offensive and defensive points are only awarded if a system’s services are online and functioning. | ||
- | See the scoring engine | + | === Persistence Points === |
+ | |||
+ | Hit the scoring engine with an HTTP GET request at where here TOKEN is your team token that we've given to you, and that IP is the scoring engine. < | ||
+ | |||
+ | < | ||
+ | curl http:// | ||
+ | </ | ||
+ | |||
+ | Or on Windows (powershell): | ||
+ | < | ||
+ | Invoke-WebRequest -Uri http:// | ||
+ | </ | ||
+ | |||
+ | See the [[https:// | ||
+ | |||
+ | |||
+ | === DakotaCon 10.1 Cyber Conquest === | ||
+ | * [[https:// |